access icon openaccess Entropy-based electricity theft detection in AMI network

Advanced metering infrastructure (AMI), one of the prime components of the smart grid, has many benefits like demand response and load management. Electricity theft, a key concern in AMI security since smart meters used in AMI are vulnerable to cyber attacks, causes millions of dollar in financial losses to utilities every year. In light of this problem, the authors propose an entropy-based electricity theft detection scheme to detect electricity theft by tracking the dynamics of consumption variations of the consumers. Relative entropy is used to compute the distance between probability distributions obtained from consumption variations. When electricity theft attacks are launched against AMI, the probability distribution of consumption variations deviates from historical consumption, thus leading to a larger relative entropy. The proposed method is tested on different attack scenarios using real smart-meter data. The results show that the proposed method detects electricity theft attacks with high detection probability.

Inspec keywords: probability; entropy; law; smart power grids; power system measurement

Other keywords: consumption variations dynamics; probability distribution; advanced metering infrastructure; entropy based electricity theft detection; smart grid; AMI network; AMI security

Subjects: Power system measurement and metering; Information theory; Information theory; Other topics in statistics; Power system management, operation and economics; Other topics in statistics; Other applications of systems theory

References

    1. 1)
      • 9. Katakey, R.: ‘India fights to keep the lights on’, June 2014. Available at http://www.bloomberg.com/news/articles/2014-06-05/india-fights-electricity-theft-as-modi-pledges-energy-upgrade.
    2. 2)
      • 8. McDaniel, P., McLaughlin, S.: ‘Security and privacy challenges in the smart grid’, IEEE Secur. Privacy, 2009, 7, (3), pp. 7577.
    3. 3)
      • 4. Lu, R., Liang, X., Li, X., et al: ‘Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (9), pp. 16211631.
    4. 4)
      • 14. Khoo, B., Cheng, Y.: ‘Using RFID for anti-theft in a Chinese electrical supply company: a cost-benefit analysis’. Wireless Telecommunications Symp. (WTS), April 2011, pp. 16.
    5. 5)
      • 28. Fawcett, T.: ‘Roc graphs: notes and practical considerations for researchers’. Technical Report, 2004.
    6. 6)
      • 23. Mashima, D., Cárdenas, A.A.: ‘Evaluating electricity theft detectors in smart grid networks’ (Springer Berlin Heidelberg, Berlin, 2012), pp. 210229.
    7. 7)
      • 22. Jiang, R., Lu, R., Wang, Y., et al: ‘Energy theft detection issues for advanced metering infrastructure in smart grid’, Tsinghua Sci. Technol., 2014, 19, (2), pp. 105120.
    8. 8)
      • 11. Lo, C.-H., Ansari, N.: ‘Consumer: a novel hybrid intrusion detection system for distribution networks in smart grid’, IEEE Trans. Emerg. Top. Comput., 2013, 1, (1), pp. 3344.
    9. 9)
      • 26. Chaojun, G., Jirutitijaroen, P., Motani, M.: ‘Detecting false data injection attacks in ac state estimation’, IEEE Trans. Smart Grid, 2015, 6, (5), pp. 24762483.
    10. 10)
      • 29. Zweig, M.H., Campbell, G.: ‘Receiver-operating characteristic (roc) plots: a fundamental evaluation tool in clinical medicine’, Clin. Chem., 1993, 39, (4), pp. 561577.
    11. 11)
      • 18. Salinas, S., Li, M., Li, P.: ‘Privacy-preserving energy theft detection in smart grids: a p2p computing approach’, IEEE J. Sel. Areas Commun., 2013, 31, (9), pp. 257267.
    12. 12)
      • 1. Jiang, R., Lu, R., Lai, C., et al: ‘Robust group key management with revocation and collusion resistance for scada in smart grid’. Proc. IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 802807.
    13. 13)
      • 20. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V.: ‘Support vector machine based data classification for detection of electricity theft’. Power Systems Conf. and Exposition (PSCE), 2011, March 2011, pp. 18.
    14. 14)
      • 2. ‘India blackouts leave 700 million without power’. Available at https://www.theguardian.com/world/2012/jul/31/india-blackout-electricity-power-cuts.
    15. 15)
      • 12. McLaughlin, S., Holbert, B., Fawaz, A., et al: ‘A multi-sensor energy theft detection framework for advanced metering infrastructures’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 13191330.
    16. 16)
      • 10. ‘Reducing technical and non-technical losses in the power sector. Washington, DC: World bank group’. Available at http://documents.worldbank.org/curated/en/829751468326689826/Reducing-technical-and-non-technical-losses-in-the-power-sector.
    17. 17)
      • 25. ‘Irish Social Science Data Archive’. Available at http://www.ucd.ie/issda/data/commissionforenergyregulationcer/.
    18. 18)
      • 24. Cover, T.M., Thomas, J.A.: ‘Elements of information theory’ (Wiley-Interscience, 2006).
    19. 19)
      • 5. ‘The NETL Modern Grid Strategy Powering our 21st-Century Economy: Advanced Metering Infrastructure’, February 2008. Available at https://www.smartgrid.gov/files/NISTSGInteropReportPostcommentperiodversion200808.pdf.
    20. 20)
      • 13. Xiao, Z., Xiao, Y., Du, D.H.c.: ‘Non-repudiation in neighborhood area networks for smart grid’, IEEE Commun. Mag., 2013, 51, (1), pp. 1826.
    21. 21)
      • 17. Angelos, E.W.S., Saavedra, O.R., Corts, O.A.C., et al: ‘Detection and identification of abnormalities in customer consumptions in power distribution systems’, IEEE Trans. Power Deliv., 2011, 26, (4), pp. 24362442.
    22. 22)
      • 21. Jokar, P., Arianpoo, N., Leung, V.C.M.: ‘Electricity theft detection in AMI using customers consumption patterns’, IEEE Trans. Smart Grid, 2016, 7, (1), pp. 216226.
    23. 23)
      • 16. Crdenas, A.A., Amin, S., Schwartz, G., et al: ‘A game theory model for electricity theft detection and privacy-aware control in AMI systems’. 50th Annual Allerton Conf. on Communication, Control, and Computing (Allerton), 2012, October 2012, pp. 18301837.
    24. 24)
      • 15. Amin, S., Schwartz, G.A., Tembine, H.: ‘Incentives and security in electricity distribution networks’. Int. Conf. on Decision and Game Theory for Security, GameSec, 2012, pp. 264280.
    25. 25)
      • 3. ‘Second day of India's electricity outage hits 620 million’. Available at http://usatoday30.usatoday.com/news/world/story/2012-07-31/india-power-outage/56600520/1.
    26. 26)
      • 7. Ward, M.: ‘Smart meters can be hacked to cut power bills’, October 2014. Available at http://www.bbc.com/news/technology-29643276.
    27. 27)
      • 27. Krishna, V.B., Weaver, G.A., Sanders, W.H., et al: ‘Pca-based method for detecting integrity attacks on advanced metering infrastructure’. Proc. of the 12th Int. Conf. on Quantitative Evaluation of Systems, New York, NY, USA, 2015, pp. 7085.
    28. 28)
      • 19. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V., et al: ‘A hybrid neural network model and encoding technique for enhanced classification of energy consumption data’. IEEE Power and Energy Society General Meeting, July 2011, pp. 18.
    29. 29)
      • 6. Wright, J.: ‘Smart meters have security holes’, 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0063
Loading

Related content

content/journals/10.1049/iet-cps.2017.0063
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading